$ sudo /usr/share/ufw/check-requirements
Has python: pass (binary: python3.7, version: 3.7.3, py3)
Has iptables: pass
Has ip6tables: pass
Has /proc/net/dev: pass
Has /proc/net/if_inet6: pass
This script will now attempt to create various rules using the iptables
and ip6tables commands. This may result in module autoloading (eg, for
IPv6).
Proceed with checks (Y/n)? yes
== IPv4 ==
Creating 'ufw-check-requirements'... done
Inserting RETURN at top of 'ufw-check-requirements'... iptables: No chain/target/match by that name.
ERROR: could insert RETURN rule into 'ufw-check-requirements'. Aborting
FAIL: check your kernel and that you have iptables >= 1.4.0
I also tested on a pristine machine:
$ sudo /usr/share/ ufw/check- requirements
Has python: pass (binary: python3.7, version: 3.7.3, py3)
Has iptables: pass
Has ip6tables: pass
Has /proc/net/dev: pass
Has /proc/net/if_inet6: pass
This script will now attempt to create various rules using the iptables requirements' ... done requirements' ... iptables: No chain/target/match by that name. requirements' . Aborting
and ip6tables commands. This may result in module autoloading (eg, for
IPv6).
Proceed with checks (Y/n)? yes
== IPv4 ==
Creating 'ufw-check-
Inserting RETURN at top of 'ufw-check-
ERROR: could insert RETURN rule into 'ufw-check-
FAIL: check your kernel and that you have iptables >= 1.4.0